Skip to content

Commit 8732f05

Browse files
Merge pull request #264964 from dileepraotv-github/02_02_updates
Added warning message
2 parents cb20b2d + 32922d0 commit 8732f05

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/cosmos-db/role-based-access-control.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ The **Access control (IAM)** pane in the Azure portal is used to configure Azure
3838

3939
:::image type="content" source="./media/role-based-access-control/database-security-identity-access-management-rbac.png" alt-text="Access control (IAM) in the Azure portal - demonstrating database security.":::
4040

41+
4142
## Custom roles
4243

4344
In addition to the built-in roles, users may also create [custom roles](../role-based-access-control/custom-roles.md) in Azure and apply these roles to service principals across all subscriptions within their Active Directory tenant. Custom roles provide users a way to create Azure role definitions with a custom set of resource provider operations. To learn which operations are available for building custom roles for Azure Cosmos DB see, [Azure Cosmos DB resource provider operations](../role-based-access-control/resource-provider-operations.md#microsoftdocumentdb)
@@ -48,6 +49,9 @@ In addition to the built-in roles, users may also create [custom roles](../role-
4849
> [!NOTE]
4950
> Custom role assignments may not always be visible in the Azure portal.
5051
52+
> [!WARNING]
53+
> Account keys are not automatically rotated or revoked after management RBAC changes. These keys give access to data plane operations. When removing access to the keys from an user, it is recommended to rotate the keys as well. For RBAC Data Plane, the Cosmos DB backend will reject requests once the roles/claims no longer match. If an user requires temporary access to data plane operations, it's recommended to use [Azure Cosmos DB RBAC](how-to-setup-rbac.md) Data Plane.
54+
5155
## <a id="prevent-sdk-changes"></a>Preventing changes from the Azure Cosmos DB SDKs
5256

5357
The Azure Cosmos DB resource provider can be locked down to prevent any changes to resources from a client connecting using the account keys (that is applications connecting via the Azure Cosmos DB SDK). This feature may be desirable for users who want higher degrees of control and governance for production environments. Preventing changes from the SDK also enables features such as resource locks and diagnostic logs for control plane operations. The clients connecting from Azure Cosmos DB SDK will be prevented from changing any property for the Azure Cosmos DB accounts, databases, containers, and throughput. The operations involving reading and writing data to Azure Cosmos DB containers themselves are not impacted.

0 commit comments

Comments
 (0)